Communication Theory of Secrecy Systems*
DOI10.1002/J.1538-7305.1949.TB00928.XzbMATH Open1200.94005OpenAlexW2109394932WikidataQ1053345 ScholiaQ1053345MaRDI QIDQ3645296FDOQ3645296
Authors: Claude Shannon
Publication date: 17 November 2009
Published in: Bell System Technical Journal (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
Recommendations
Research exposition (monographs, survey articles) pertaining to information and communication theory (94-02) Communication theory (94A05) Cryptography (94A60)
Cited In (only showing first 100 items - show all)
- Randomized machine learning of nonlinear models with application to forecasting the development of an epidemic process
- Doubly perfect nonlinear Boolean permutations
- Wave-shaped round functions and primitive groups
- Construction and search of balanced Boolean functions on even number of variables towards excellent autocorrelation profile
- Title not available (Why is that?)
- FAST, PARALLEL AND SECURE CRYPTOGRAPHY ALGORITHM USING LORENZ'S ATTRACTOR
- Dirac-based reduction techniques for quantitative analysis of discrete-time Markov models
- Connections among nonlinearity, avalanche and correlation immunity
- Digital image scrambling based on a new one-dimensional coupled sine map
- From enumerating to generating: a linear time algorithm for generating 2D lattice paths with a given number of turns
- Fault tolerant authenticated quantum dialogue based on logical qubits and controlled-not operations
- Properties of two Shannon's ciphers
- A new synchronisation method of fractional-order chaotic systems with distinct orders and dimensions and its application in secure communication
- The Many Entropies in One-Way Functions
- Secure image encryption algorithm design using a novel chaos based S-Box
- Survey on hardware implementation of random number generators on FPGA: theory and experimental analyses
- The Vernam cipher is robust to small deviations from randomness
- Cryptanalysis of a classical chaos-based cryptosystem with some quantum cryptography features
- Semi-quantum dialogue based on single photons
- Absolutely secure message transmission using a key sharing graph
- Authentication codes in plaintext and chosen-content attacks
- Mathematical problems in cryptology
- A method to calculate differential uniformity for permutations
- A novel stream encryption scheme with avalanche effect
- Analysis of bitsum attack on block ciphers
- On APN exponents, characterizations of differentially uniform functions by the Walsh transform, and related cyclic-difference-set-like structures
- Analyzing permutations for AES-like ciphers: understanding shiftrows
- Two intercept-and-resend attacks on a bidirectional quantum secure direct communication and its improvement
- Quantum encryption and generalized Shannon impossibility
- A new password authentication mechanism based on two phases encryption
- Randomness and Representation of Span n Sequences
- New public-key quantum signature scheme with quantum one-way function
- A method for constructing bijective S-box with high nonlinearity based on chaos and optimization
- Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis
- Illusory decoherence
- Chasing diagrams in cryptography
- Title not available (Why is that?)
- Attainable unconditional security for shared-key cryptosystems
- Gate elimination for linear functions and new feebly secure constructions
- Secrecy via Sources and Channels
- A cryptosystem based on cellular automata
- Biunitary constructions in quantum information
- Circuit complexity of linear functions: gate elimination and feeble security
- Feebly secure cryptographic primitives
- Integration of quantum key distribution and private classical communication through continuous variable
- Effect of Rayleigh fading on non-coherent sequence synchronization for multi-user chaos based DS-CDMA
- Mechanism design and communication networks
- Literature survey on nonlinear components and chaotic nonlinear components of block ciphers
- SYNCHRONIZATION OF CHUA CHAOTIC CIRCUITS WITH APPLICATION TO THE BIDIRECTIONAL SECURE COMMUNICATION SYSTEMS
- On the diffusion property of iterated functions
- Investigation for 8-bit \textsc{SKINNY}-like S-boxes, analysis and applications
- Leveraging environmental correlations: the thermodynamics of requisite variety
- A data-driven smoothed particle hydrodynamics method for fluids
- On the construction of \(20 \times 20\) and \(2 4 \times 24\) binary matrices with good implementation properties for lightweight block ciphers and hash functions
- Image encryption using the chaotic Josephus matrix
- On the confusion and diffusion properties of Maiorana-McFarland's and extended Maiorana-McFarland's functions
- Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes
- Continuous-variable quantum key distribution protocols with eight-state discrete modulation
- Breaking a chaotic image encryption algorithm based on perceptron model
- An information-theoretic model for steganography
- A quantum key distribution routing scheme for hybrid-trusted QKD network system
- Markovian and non-Markovian quantum measurements
- A formal analysis of information disclosure in data exchange
- Secure Communication Systems Based on the Synchronization of Chaotic Systems
- Cascade ciphers: The importance of being first
- On functional specification of Latin squares
- Combinatorial bounds and characterizations of splitting authentication codes
- A secure image encryption algorithm based on Rubik's cube principle
- Resource requirements of private quantum channels and consequences for oblivious remote state preparation
- Xor-implications and E-implications: classes of fuzzy implications based on fuzzy Xor
- Analysis and improvement of a hash-based image encryption algorithm
- Multi-party quantum secret sharing with the single-particle quantum state to encode the information
- Three-party semi-quantum protocol for deterministic secure quantum dialogue based on GHZ states
- Latin squares over Abelian groups
- On the group generated by the round functions of translation based ciphers over arbitrary finite fields
- Towards a general construction of recursive MDS diffusion layers
- Improvement of information leakage resistant quantum dialogue with single photons in both polarization and spatial-mode degrees of freedom
- Improved quantum `ping-pong protocol based on five-qubit GHZ state and classical CNOT operation
- Symmetry of information and one-way functions
- A new spatiotemporally chaotic cryptosystem and its security and performance analyses
- Quantum privacy and quantum wiretap channels
- A chaotic block cipher algorithm for image cryptosystems
- A novel algorithm for image encryption based on mixture of chaotic maps
- Security of public key encryption technique based on multiple chaotic systems
- REVISITING Xor-IMPLICATIONS: CLASSES OF FUZZY (CO)IMPLICATIONS BASED ON f-Xor (f-XNor) CONNECTIVES
- One-time pad as a nonlinear dynamical system
- Information leakage resistant quantum dialogue with single photons in both polarization and spatial-mode degrees of freedom
- Practical Algebraic Attacks on the Hitag2 Stream Cipher
- Public-key encryption with chaos
- Estimation of characteristics of randomized static models of data (entropy-robust approach)
- A note on two classes of Boolean functions with optimal algebraic immunity
- Chaos-based cryptograph incorporated with \(S\)-box algebraic operation
- QUANTUM KEY-DISTRIBUTION PROTOCOL FOR N-BIT SECRET MESSAGE COMMUNICATION
- The iterated random permutation problem with applications to cascade encryption
- A parallel encryption algorithm based on piecewise linear chaotic map
- Using quantum key distribution for cryptographic purposes: a survey
- Hyperchaotic encryption based on multi-scroll piecewise linear systems
- A fast image encryption and authentication scheme based on chaotic maps
- Fault-tolerant authenticated quantum dialogue using logical Bell states
- An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity
This page was built for publication: Communication Theory of Secrecy Systems*
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3645296)